List of Tables
Table 39 LAN IP ...................................................................................................................................
121
Table 40 Advanced LAN Setup ............................................................................................................
Table 41 DHCP Setup .........................................................................................................................
123
Table 42 LAN Client List ......................................................................................................................
124
Table 43 LAN IP Alias ..........................................................................................................................
126
Table 44 Types of Encryption for Each Type of Authentication ...........................................................
129
Table 45 Wireless LAN: General .........................................................................................................
130
Table 46 Wireless No Security .............................................................................................................
132
Table 47 Wireless: Static WEP Encryption ..........................................................................................
133
Table 48 Wireless: WPA-PSK/WPA2-PSK ...........................................................................................
134
Table 49 Wireless: WPA/WPA2 ...........................................................................................................
136
Table 50 Wireless LAN: Advanced ......................................................................................................
137
Table 51 MAC Address Filter ...............................................................................................................
138
Table 52 Network > Wireless LAN > WPS ...........................................................................................
145
Table 53 Network > Wireless LAN > WPS Station ...............................................................................
146
Table 54 NAT Definitions .....................................................................................................................
147
Table 55 NAT Mapping Types ..............................................................................................................
149
Table 56 NAT General .........................................................................................................................
151
Table 57 Services and Port Numbers ..................................................................................................
152
Table 58 NAT Port Forwarding ............................................................................................................
154
Table 59 Port Forwarding Rule Setup ..................................................................................................
155
Table 60 Common IP Ports ..................................................................................................................
161
Table 61 ICMP Commands That Trigger Alerts ...................................................................................
164
Table 62 Legal NetBIOS Commands ...................................................................................................
Table 63 Legal SMTP Commands .......................................................................................................
Table 64 Firewall: General ...................................................................................................................
177
Table 65 Firewall Rules .......................................................................................................................
178
Table 66 Firewall: Edit Rule .................................................................................................................
180
Table 67 Customized Services ............................................................................................................
182
Table 68 Firewall: Configure Customized Services .............................................................................
183
Table 69 Predefined Services ..............................................................................................................
187
Table 70 Firewall: Anti Probing ............................................................................................................
190
Table 71 Firewall: Threshold ................................................................................................................
192
Table 72 Content Filter: Keyword ........................................................................................................
196
Table 73 Content Filter: Schedule .......................................................................................................
197
Table 74 Content Filter: Trusted ..........................................................................................................
198
Table 75 Static Route ...........................................................................................................................
202
Table 76 Static Route Edit ...................................................................................................................
203
Table 77 Application and Subnet-based Bandwidth Management Example .......................................
206
Table 78 Maximize Bandwidth Usage Example ...................................................................................
207
Table 79 Priority-based Allotment of Unused and Unbudgeted Bandwidth Example ..........................
208
Table 80 Fairness-based Allotment of Unused and Unbudgeted Bandwidth Example .......................
Table 81 Bandwidth Management Priorities ........................................................................................
209
28
P-660HW-Tx v3 User’s Guide